Sciweavers

1177 search results - page 134 / 236
» A Theory of Role Composition
Sort
View
99
Voted
CCR
2008
77views more  CCR 2008»
15 years 1 months ago
What would Darwin think about clean-slate architectures?
As significant resources are directed towards clean-slate networking research, it is imperative to understand how cleanslate architectural research compares to the diametrically o...
Constantine Dovrolis
CJ
2006
123views more  CJ 2006»
15 years 1 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
TIT
2008
78views more  TIT 2008»
15 years 27 days ago
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications
The nonlinearity profile of a Boolean function (i.e. the sequence of its minimum Hamming distances nlr(f) to all functions of degrees at most r, for r 1) is a cryptographic crite...
Claude Carlet
JSS
2007
104views more  JSS 2007»
15 years 26 days ago
Institutionalization of software product line: An empirical investigation of key organizational factors
A good fit between the person and the organization is essential in a better organizational performance. This is even more crucial in case of institutionalization of a software pr...
Faheem Ahmed, Luiz Fernando Capretz, Shahbaz Ali S...
TVCG
2010
139views more  TVCG 2010»
14 years 11 months ago
Mental Models, Visual Reasoning and Interaction in Information Visualization: A Top-down Perspective
—Although previous research has suggested that examining the interplay between internal and external representations can benefit our understanding of the role of information vis...
Zhicheng Liu, John T. Stasko